Malicious node and malicious observer node detection system in MANETs

Summary Mobile ad‐hoc networks (MANETs) are generally organized without infrastructure. Hence, they are moderately defenseless to malicious active and passive attackers that target to damage and trace the data transmission direction. Therefore, the malicious node (MN) (active attacker) and malicious...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Concurrency and computation 2021-02, Vol.33 (3), p.n/a, Article 5241
Hauptverfasser: Durga Devi, Saravanan, Rukmani Devi, Dhamotharan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Summary Mobile ad‐hoc networks (MANETs) are generally organized without infrastructure. Hence, they are moderately defenseless to malicious active and passive attackers that target to damage and trace the data transmission direction. Therefore, the malicious node (MN) (active attacker) and malicious observer node (MON) (passive attacker) detection system (MODS) is an important challenge in MANETs. It is quite easy to observe a node that induces malicious activities in other nodes, but it is very difficult to identify a node that passively observes and misuses network data. In this work, we propose context‐free grammar (CFG) and Fibonacci‐Pascal triangle (FPT) methods are in MANETs. Here, the MODS used CFG and FPT methods. The CFG is used to isolate the MN, and FPT conceals the real information of the mobile nodes. The data path is protected from mobile MONs by sending a secret message to the destination. The significant application of this scheme is enhancing military security. The simulation results demonstrate that the dynamic estimation of the quality‐of‐service metrics improves the 45% throughput in the network.
ISSN:1532-0626
1532-0634
DOI:10.1002/cpe.5241